{"id":"https://openalex.org/W2024985460","doi":"https://doi.org/10.1145/2810103.2810128","title":"POSTER","display_name":"POSTER","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W2024985460","doi":"https://doi.org/10.1145/2810103.2810128","mag":"2024985460"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2810128","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2810128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101727014","display_name":"Depeng Li","orcid":"https://orcid.org/0000-0002-7072-0201"},"institutions":[{"id":"https://openalex.org/I117965899","display_name":"University of Hawai\u02bbi at M\u0101noa","ror":"https://ror.org/01wspgy28","country_code":"US","type":"education","lineage":["https://openalex.org/I117965899"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Depeng Li","raw_affiliation_strings":["University of Hawaii at Manoa, Honolulu, HI, USA"],"affiliations":[{"raw_affiliation_string":"University of Hawaii at Manoa, Honolulu, HI, USA","institution_ids":["https://openalex.org/I117965899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052787847","display_name":"Sachin Shetty","orcid":"https://orcid.org/0000-0002-8789-0610"},"institutions":[{"id":"https://openalex.org/I75256744","display_name":"Tennessee State University","ror":"https://ror.org/01fpczx89","country_code":"US","type":"education","lineage":["https://openalex.org/I75256744"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sachin Shetty","raw_affiliation_strings":["Tennessee State University, Nashville, TN, USA","Tennessee State University, Nashville, TN, USA,"],"affiliations":[{"raw_affiliation_string":"Tennessee State University, Nashville, TN, USA","institution_ids":["https://openalex.org/I75256744"]},{"raw_affiliation_string":"Tennessee State University, Nashville, TN, USA,","institution_ids":["https://openalex.org/I75256744"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101727014"],"corresponding_institution_ids":["https://openalex.org/I117965899"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04322773,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1647","last_page":"1649"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7882139682769775},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6238845586776733},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5469565391540527},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5026531219482422},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4921833574771881},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.41160690784454346},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3761868476867676},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.358126163482666},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1450977325439453},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11652696132659912}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7882139682769775},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6238845586776733},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5469565391540527},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5026531219482422},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4921833574771881},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.41160690784454346},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3761868476867676},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.358126163482666},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1450977325439453},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11652696132659912},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2810103.2810128","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2810128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.9100000262260437,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1724472458","https://openalex.org/W2020064736","https://openalex.org/W2057405764","https://openalex.org/W2067740414","https://openalex.org/W2071086768","https://openalex.org/W2101771965","https://openalex.org/W2116092561","https://openalex.org/W2118071847","https://openalex.org/W2120531712","https://openalex.org/W2138483746","https://openalex.org/W2139106762"],"related_works":["https://openalex.org/W4315488958","https://openalex.org/W3176515490","https://openalex.org/W3185918024","https://openalex.org/W3138333794","https://openalex.org/W2773408865","https://openalex.org/W4226426276","https://openalex.org/W2083287929","https://openalex.org/W3132022922","https://openalex.org/W4241535341","https://openalex.org/W2735874745"],"abstract_inverted_index":{"Energy-wasting":[0],"behavior":[1,45],"is":[2,75,113],"a":[3,53,86,98],"big":[4],"concern":[5],"as":[6],"it":[7,140],"wastes":[8],"around":[9],"1/3":[10],"of":[11,55,100],"all":[12],"energy":[13],"consumption":[14,83],"in":[15,33,58,145],"buildings.":[16],"Current":[17],"solutions":[18],"to":[19,65,121],"address":[20,52],"this":[21,38,146],"issue":[22],"either":[23],"rarely":[24],"offer":[25],"privacy":[26,87,95,125,129],"preservation":[27],"or":[28],"cannot":[29],"satisfy":[30],"occupants'":[31],"comfort":[32],"an":[34,43],"acceptable":[35],"level.":[36],"In":[37,85],"paper,":[39],"we":[40,51,89,91,119,138],"first":[41],"propose":[42],"energy-wasting":[44],"detection":[46],"platform.":[47],"Based":[48],"on":[49,131],"that,":[50],"couple":[54],"privacy-related":[56],"challenges":[57],"our":[59,111,124],"platform":[60],"through":[61],"utilizing":[62],"functional":[63],"encryption":[64],"hide":[66],"video":[67],"data":[68,79],"and":[69,107,134,137],"by":[70,97],"introducing":[71],"noise":[72],"disturbance":[73],"which":[74],"mixed":[76],"with":[77],"metering":[78],"e.g.":[80,103],"A/C":[81],"power":[82],"signatures.":[84],"framework":[88],"proposed,":[90],"further":[92,122],"quantify":[93],"the":[94],"leakage":[96,130],"set":[99],"theoretical":[101],"models":[102],"Hidden":[104],"Markov":[105],"model":[106],"differential":[108],"privacy.":[109],"Since":[110],"paper":[112],"still":[114],"at":[115],"its":[116],"start":[117],"phase,":[118],"plan":[120],"extend":[123],"evaluation":[126],"model,":[127],"assess":[128],"real-world":[132],"dataset":[133],"accomplish":[135],"experiments":[136],"wish":[139],"could":[141],"inspire":[142],"colleagues'":[143],"interests":[144],"area.":[147]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
